General

  • Target

    2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk

  • Size

    27.6MB

  • MD5

    d7d1fa33325a6e19694456fff690d50b

  • SHA1

    35e9c4fdda414a33de57c70d666d88ae87cc622a

  • SHA256

    9a48fc78ecd173b8a61b1104b1da2ab8d9d44c1f2fc96b00370abae3221b0127

  • SHA512

    f9373e9bc52696275426aa84c1ccb2aa345c114cc22e0c74fad4fcf458e16853c4b89940845fc7313f180ebecf1ff578f1fbce1c087825c25a10e2b7c4e11a0d

  • SSDEEP

    393216:u9bQVj4y/KKWTJRmSQh2AYrjq/6yq0B4qUWBUQn9o2f03kND5/wPP8Mz:u9bk/9IESQhge/6F0BWW2QnGki8Mz

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    c7125f57470fa6ec0132b5bcc3e2928c


    Headers

    Imports

    Sections